Maverick Flying Car at Oshkosh
October 13, 2010 – Steve Saint of I-TEC drove his road-legal flying car from Florida to Oshkosh this summer. Since then the FAA has also issued the Maverick a S-LSA aircraft airworthiness certificate. I-TEC hopes to be in production by EAA Oshkosh 2011.

Maverick Flying Car at Oshkosh
October 13, 2010 – Steve Saint of I-TEC drove his road-legal flying car from Florida to Oshkosh this summer. Since then the FAA has also issued the Maverick a S-LSA aircraft airworthiness certificate. I-TEC hopes to be in production by EAA Oshkosh 2011.

The Fake Name Generator makes international names based on the 3000 most common multi ethnic American names to create believable random names. The most popular male, female, and surnames are merged to make the new fake name.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

We’re pleased to announce that we’ve compiled the results of many weeks of fast-paced analysis of Stuxnet into a white paper entitled the W32.Stuxnet Dossier. On top of finding elements we described in the ongoing Stuxnet summer blog series, you will find all technical details about the threat’s components and data structures, as well as high level information, including:

The Stuxnet virus, which has attacked Iran’s nuclear facilities and which Israel is suspected of creating, has set back the Islamic Republic’s nuclear program by two years, a top German computer consultant who was one of the first experts to analyze the program’s code told The Jerusalem Post on Tuesday.

While this week introduced security concerns, it also brought forward several great ways to help get your own digital life secure and under control. Looking to past and present, here are our best guides to help you enhance your security.

Google has expanded a program designed to prevent search engine users from visiting websites that could scam them or install malware on their computers. The feature includes the words “This site may be compromised” to search results that contain sites that Google’s automated tools indicate may be under the influence of third-party spammers, phishers or other scammers. Hackers often exploit vulnerabilities on legitimate sites so they can be used as a low-cost and stealthy platform for carrying out phishing attacks and spamming operations.

The conventional wisdom about stroke victims is that after about 12 months of rehabilitation aimed at restoring motor control, recovery levels off. Patients never regain more movement, never get beyond whatever plateau they’ve reached by that time. But there’s a company in Sunnyvale, CA, that may be proving otherwise. Tibion makes a robotic, battery-powered exoskeleton—in effect, a wearable bionic leg—that’s helping stroke victims make significant gains long after other therapies have stopped working.